{"title":"Improving network security using machine learning techniques","authors":"Shaik Akbar, J. A. Chandulal, K. N. Rao, G. Kumar","doi":"10.1109/ICCIC.2012.6510197","DOIUrl":null,"url":null,"abstract":"Discovery of malicious correlations in computer networks has been an emergent problem motivating extensive research in computer science to develop improved intrusion detecting systems (IDS). In this manuscript, we present a machine learning approach known as Decision Tree (C4.5) Algorithm and Genetic Algorithm, to classify such risky/attack type of connections. The algorithm obtains into consideration dissimilar features in network connections and to create a classification rule set. Every rule in rule set recognizes a particular attack type. For this research, we implement a GA, C.45 and educated it on the KDD Cup 99 data set to create a rule set that can be functional to the IDS to recognize and categorize dissimilar varieties of assault links. During our study, we have developed a rule set contain of six rules to classify six dissimilar attack type of connections that fall into 4 modules namely DoS, U2R, root to local and probing attacks. The rule produces works with 93.70% correctness for detecting the denial of service type of attack connections, and with significant accuracy for detecting the root to local, user to root and probe connections. Results from our experiment have given hopeful results towards applying enhanced genetic algorithm for NIDS.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on Computational Intelligence and Computing Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIC.2012.6510197","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
Discovery of malicious correlations in computer networks has been an emergent problem motivating extensive research in computer science to develop improved intrusion detecting systems (IDS). In this manuscript, we present a machine learning approach known as Decision Tree (C4.5) Algorithm and Genetic Algorithm, to classify such risky/attack type of connections. The algorithm obtains into consideration dissimilar features in network connections and to create a classification rule set. Every rule in rule set recognizes a particular attack type. For this research, we implement a GA, C.45 and educated it on the KDD Cup 99 data set to create a rule set that can be functional to the IDS to recognize and categorize dissimilar varieties of assault links. During our study, we have developed a rule set contain of six rules to classify six dissimilar attack type of connections that fall into 4 modules namely DoS, U2R, root to local and probing attacks. The rule produces works with 93.70% correctness for detecting the denial of service type of attack connections, and with significant accuracy for detecting the root to local, user to root and probe connections. Results from our experiment have given hopeful results towards applying enhanced genetic algorithm for NIDS.
计算机网络中恶意关联的发现已成为一个新兴问题,促使计算机科学领域广泛研究开发改进的入侵检测系统(IDS)。在本文中,我们提出了一种称为决策树(C4.5)算法和遗传算法的机器学习方法,用于对此类风险/攻击类型的连接进行分类。该算法得到了考虑网络连接的不同特征并创建分类规则集的方法。规则集中的每条规则都识别一种特定的攻击类型。在这项研究中,我们实现了一个GA, C.45,并在KDD Cup 99数据集上对其进行了训练,以创建一个规则集,该规则集可以用于IDS识别和分类不同类型的攻击链接。在我们的研究中,我们开发了一个包含六条规则的规则集,将六种不同的攻击类型连接分为4个模块,即DoS, U2R,根到本地和探测攻击。该规则产生的检测拒绝服务类型攻击连接的准确率为93.70%,检测根到本地、用户到根和探针连接的准确率显著。我们的实验结果为将增强型遗传算法应用于NIDS提供了有希望的结果。